/* * $Id$ * Copyright (c) 2016-2018 Chung, Hyung-Hwan. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #if defined(HAVE_TIME_H) # include #endif #if defined(HAVE_SYS_TIME_H) # include #endif #if defined(HAVE_SIGNAL_H) # include #endif #if defined(HAVE_SYS_UIO_H) # include #endif /* ========================================================================= */ typedef struct server_xtn_t server_xtn_t; struct server_xtn_t { int logfd; hak_bitmask_t logmask; int logfd_istty; struct { hak_bch_t buf[4096]; hak_oow_t len; } logbuf; /* used by the json submodule */ int json_depth; }; typedef server_xtn_t client_xtn_t; typedef server_xtn_t json_xtn_t; /* ========================================================================= */ static void* sys_alloc (hak_mmgr_t* mmgr, hak_oow_t size) { return malloc(size); } static void* sys_realloc (hak_mmgr_t* mmgr, void* ptr, hak_oow_t size) { return realloc(ptr, size); } static void sys_free (hak_mmgr_t* mmgr, void* ptr) { free (ptr); } static hak_mmgr_t sys_mmgr = { sys_alloc, sys_realloc, sys_free, HAK_NULL }; /* ========================================================================= */ static int write_all (int fd, const hak_bch_t* ptr, hak_oow_t len) { while (len > 0) { hak_ooi_t wr; wr = write(fd, ptr, len); if (wr <= -1) { #if defined(EAGAIN) && defined(EWOULDBLOCK) && (EAGAIN == EWOULDBLOCK) if (errno == EAGAIN) continue; #else #if defined(EAGAIN) if (errno == EAGAIN) continue; #elif defined(EWOULDBLOCK) if (errno == EWOULDBLOCK) continue; #endif #endif #if defined(EINTR) /* TODO: would this interfere with non-blocking nature of this VM? */ if (errno == EINTR) continue; #endif return -1; } ptr += wr; len -= wr; } return 0; } static int write_log (server_xtn_t* xtn, int fd, const hak_bch_t* ptr, hak_oow_t len) { while (len > 0) { if (xtn->logbuf.len > 0) { hak_oow_t rcapa, cplen; rcapa = HAK_COUNTOF(xtn->logbuf.buf) - xtn->logbuf.len; cplen = (len >= rcapa)? rcapa: len; memcpy (&xtn->logbuf.buf[xtn->logbuf.len], ptr, cplen); xtn->logbuf.len += cplen; ptr += cplen; len -= cplen; if (xtn->logbuf.len >= HAK_COUNTOF(xtn->logbuf.buf)) { write_all(fd, xtn->logbuf.buf, xtn->logbuf.len); xtn->logbuf.len = 0; } } else { hak_oow_t rcapa; rcapa = HAK_COUNTOF(xtn->logbuf.buf); if (len >= rcapa) { write_all (fd, ptr, rcapa); ptr += rcapa; len -= rcapa; } else { memcpy (xtn->logbuf.buf, ptr, len); xtn->logbuf.len += len; ptr += len; len -= len; } } } return 0; } static void flush_log (server_xtn_t* xtn, int fd) { if (xtn->logbuf.len > 0) { write_all (fd, xtn->logbuf.buf, xtn->logbuf.len); xtn->logbuf.len = 0; } } static void log_write (server_xtn_t* xtn, hak_oow_t wid, hak_bitmask_t mask, const hak_ooch_t* msg, hak_oow_t len) { hak_bch_t buf[256]; hak_oow_t ucslen, bcslen; hak_oow_t msgidx; int n, logfd; if (mask & HAK_LOG_STDERR) { /* the messages that go to STDERR don't get masked out */ logfd = 2; } else { if (!(xtn->logmask & mask & ~HAK_LOG_ALL_LEVELS)) return; /* check log types */ if (!(xtn->logmask & mask & ~HAK_LOG_ALL_TYPES)) return; /* check log levels */ if (mask & HAK_LOG_STDOUT) logfd = 1; else { logfd = xtn->logfd; if (logfd <= -1) return; } } /* TODO: beautify the log message. * do classification based on mask. */ if (!(mask & (HAK_LOG_STDOUT | HAK_LOG_STDERR))) { time_t now; char ts[32]; size_t tslen; struct tm tm, *tmp; now = time(NULL); #if defined(__OS2__) tmp = _localtime(&now, &tm); #elif defined(HAVE_LOCALTIME_R) tmp = localtime_r(&now, &tm); #else tmp = localtime(&now); #endif #if defined(HAVE_STRFTIME_SMALL_Z) tslen = strftime(ts, sizeof(ts), "%Y-%m-%d %H:%M:%S %z ", tmp); #else tslen = strftime(ts, sizeof(ts), "%Y-%m-%d %H:%M:%S %Z ", tmp); #endif if (tslen == 0) { strcpy (ts, "0000-00-00 00:00:00 +0000"); tslen = 25; } write_log (xtn, logfd, ts, tslen); if (wid != HAK_SERVER_WID_INVALID) { /* TODO: check if the underlying snprintf support %zd */ tslen = snprintf (ts, sizeof(ts), "[%zu] ", wid); write_log (xtn, logfd, ts, tslen); } } if (logfd == xtn->logfd && xtn->logfd_istty) { if (mask & HAK_LOG_FATAL) write_log (xtn, logfd, "\x1B[1;31m", 7); else if (mask & HAK_LOG_ERROR) write_log (xtn, logfd, "\x1B[1;32m", 7); else if (mask & HAK_LOG_WARN) write_log (xtn, logfd, "\x1B[1;33m", 7); } #if defined(HAK_OOCH_IS_UCH) msgidx = 0; while (len > 0) { ucslen = len; bcslen = HAK_COUNTOF(buf); n = hak_conv_oochars_to_bchars_with_cmgr(&msg[msgidx], &ucslen, buf, &bcslen, hak_get_utf8_cmgr()); if (n == 0 || n == -2) { /* n = 0: * converted all successfully * n == -2: * buffer not sufficient. not all got converted yet. * write what have been converted this round. */ /*HAK_ASSERT (hak, ucslen > 0); */ /* if this fails, the buffer size must be increased */ /*assert (ucslen > 0);*/ /* attempt to write all converted characters */ if (write_log(xtn, logfd, buf, bcslen) <= -1) break; if (n == 0) break; else { msgidx += ucslen; len -= ucslen; } } else if (n <= -1) { /* conversion error */ if (bcslen <= 0) break; if (write_log(xtn, logfd, buf, bcslen) <= -1) break; msgidx += ucslen; len -= ucslen; } } #else write_log (xtn, logfd, msg, len); #endif if (logfd == xtn->logfd && xtn->logfd_istty) { if (mask & (HAK_LOG_FATAL | HAK_LOG_ERROR | HAK_LOG_WARN)) write_log (xtn, logfd, "\x1B[0m", 4); } flush_log (xtn, logfd); } /* ========================================================================= */ static void server_log_write (hak_server_t* server, hak_oow_t wid, hak_bitmask_t mask, const hak_ooch_t* msg, hak_oow_t len) { log_write ((server_xtn_t*)hak_server_getxtn(server), wid, mask, msg, len); } static void client_log_write (hak_client_t* client, hak_bitmask_t mask, const hak_ooch_t* msg, hak_oow_t len) { log_write ((client_xtn_t*)hak_client_getxtn(client), HAK_SERVER_WID_INVALID, mask, msg, len); } static void json_log_write (hak_json_t* json, hak_bitmask_t mask, const hak_ooch_t* msg, hak_oow_t len) { log_write ((json_xtn_t*)hak_json_getxtn(json), HAK_SERVER_WID_INVALID, mask, msg, len); } /* ========================================================================= */ static hak_server_t* g_server = HAK_NULL; static hak_client_t* g_client = HAK_NULL; /* ========================================================================= */ typedef void (*signal_handler_t) (int, siginfo_t*, void*); static void handle_sigint (int sig, siginfo_t* siginfo, void* ctx) { if (g_server) hak_server_stop (g_server); if (g_client) hak_client_stop (g_client); } static void set_signal (int sig, signal_handler_t handler) { struct sigaction sa; memset (&sa, 0, sizeof(sa)); /*sa.sa_handler = handler;*/ sa.sa_flags = SA_SIGINFO; sa.sa_sigaction = handler; sigemptyset (&sa.sa_mask); sigaction (sig, &sa, NULL); } static void set_signal_to_ignore (int sig) { struct sigaction sa; memset (&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; sa.sa_flags = 0; sigemptyset (&sa.sa_mask); sigaction (sig, &sa, NULL); } static void set_signal_to_default (int sig) { struct sigaction sa; memset (&sa, 0, sizeof(sa)); sa.sa_handler = SIG_DFL; sa.sa_flags = 0; sigemptyset (&sa.sa_mask); sigaction (sig, &sa, NULL); } /* ========================================================================= */ static int handle_logopt (server_xtn_t* xtn, const hak_bch_t* str) { hak_bch_t* xstr = (hak_bch_t*)str; hak_bch_t* cm, * flt; hak_bitmask_t logmask; cm = hak_find_bchar_in_bcstr(xstr, ','); if (cm) { /* i duplicate this string for open() below as open() doesn't * accept a length-bounded string */ xstr = strdup(str); if (!xstr) { fprintf (stderr, "ERROR: out of memory in duplicating %s\n", str); return -1; } cm = hak_find_bchar_in_bcstr(xstr, ','); *cm = '\0'; logmask = xtn->logmask; do { flt = cm + 1; cm = hak_find_bchar_in_bcstr(flt, ','); if (cm) *cm = '\0'; if (hak_comp_bcstr(flt, "app") == 0) logmask |= HAK_LOG_APP; else if (hak_comp_bcstr(flt, "compiler") == 0) logmask |= HAK_LOG_COMPILER; else if (hak_comp_bcstr(flt, "vm") == 0) logmask |= HAK_LOG_VM; else if (hak_comp_bcstr(flt, "mnemonic") == 0) logmask |= HAK_LOG_MNEMONIC; else if (hak_comp_bcstr(flt, "gc") == 0) logmask |= HAK_LOG_GC; else if (hak_comp_bcstr(flt, "ic") == 0) logmask |= HAK_LOG_IC; else if (hak_comp_bcstr(flt, "primitive") == 0) logmask |= HAK_LOG_PRIMITIVE; else if (hak_comp_bcstr(flt, "fatal") == 0) logmask |= HAK_LOG_FATAL; else if (hak_comp_bcstr(flt, "error") == 0) logmask |= HAK_LOG_ERROR; else if (hak_comp_bcstr(flt, "warn") == 0) logmask |= HAK_LOG_WARN; else if (hak_comp_bcstr(flt, "info") == 0) logmask |= HAK_LOG_INFO; else if (hak_comp_bcstr(flt, "debug") == 0) logmask |= HAK_LOG_DEBUG; else if (hak_comp_bcstr(flt, "fatal+") == 0) logmask |= HAK_LOG_FATAL; else if (hak_comp_bcstr(flt, "error+") == 0) logmask |= HAK_LOG_FATAL | HAK_LOG_ERROR; else if (hak_comp_bcstr(flt, "warn+") == 0) logmask |= HAK_LOG_FATAL | HAK_LOG_ERROR | HAK_LOG_WARN; else if (hak_comp_bcstr(flt, "info+") == 0) logmask |= HAK_LOG_FATAL | HAK_LOG_ERROR | HAK_LOG_WARN | HAK_LOG_INFO; else if (hak_comp_bcstr(flt, "debug+") == 0) logmask |= HAK_LOG_FATAL | HAK_LOG_ERROR | HAK_LOG_WARN | HAK_LOG_INFO | HAK_LOG_DEBUG; else { fprintf (stderr, "ERROR: unknown log option value - %s\n", flt); if (str != xstr) free (xstr); return -1; } } while (cm); if (!(logmask & HAK_LOG_ALL_TYPES)) logmask |= HAK_LOG_ALL_TYPES; /* no types specified. force to all types */ if (!(logmask & HAK_LOG_ALL_LEVELS)) logmask |= HAK_LOG_ALL_LEVELS; /* no levels specified. force to all levels */ } else { logmask = HAK_LOG_ALL_LEVELS | HAK_LOG_ALL_TYPES; } xtn->logfd = open(xstr, O_CREAT | O_WRONLY | O_APPEND , 0644); if (xtn->logfd == -1) { fprintf (stderr, "ERROR: cannot open a log file %s\n", xstr); if (str != xstr) free (xstr); return -1; } xtn->logmask = logmask; #if defined(HAVE_ISATTY) xtn->logfd_istty = isatty(xtn->logfd); #endif if (str != xstr) free (xstr); return 0; } static int server_handle_logopt (hak_server_t* server, const hak_bch_t* str) { return handle_logopt((server_xtn_t*)hak_server_getxtn(server), str); } static int client_handle_logopt (hak_client_t* client, const hak_bch_t* str) { return handle_logopt((client_xtn_t*)hak_client_getxtn(client), str); } #if defined(HAK_BUILD_DEBUG) static int handle_dbgopt (hak_server_t* server, const char* str) { const hak_bch_t* cm, * flt; hak_oow_t len; hak_bitmask_t trait; hak_server_getoption (server, HAK_SERVER_TRAIT, &trait); cm = str - 1; do { flt = cm + 1; cm = hak_find_bchar_in_bcstr(flt, ','); len = cm? (cm - flt): hak_count_bcstr(flt); if (hak_comp_bchars_bcstr(flt, len, "gc") == 0) trait |= HAK_SERVER_TRAIT_DEBUG_GC; else if (hak_comp_bchars_bcstr(flt, len, "bigint") == 0) trait |= HAK_SERVER_TRAIT_DEBUG_BIGINT; else { fprintf (stderr, "ERROR: unknown debug option value - %.*s\n", (int)len, flt); return -1; } } while (cm); hak_server_setoption (server, HAK_SERVER_TRAIT, &trait); return 0; } #endif static int handle_incpath (hak_server_t* server, const char* str) { #if defined(HAK_OOCH_IS_UCH) hak_ooch_t incpath[HAK_PATH_MAX + 1]; hak_oow_t bcslen, ucslen; ucslen = HAK_COUNTOF(incpath); if (hak_conv_bcstr_to_ucstr_with_cmgr(str, &bcslen, incpath, &ucslen, hak_server_getcmgr(server), 1) <= -1) return -1; return hak_server_setoption(server, HAK_SERVER_SCRIPT_INCLUDE_PATH, incpath); #else return hak_server_setoption(server, HAK_SERVER_SCRIPT_INCLUDE_PATH, str); #endif } /* ========================================================================= */ #define MIN_WORKER_STACK_SIZE 512000ul #define MIN_ACTOR_HEAP_SIZE 512000ul static int server_main (const char* outer, int argc, char* argv[]) { hak_bci_t c; static hak_bopt_lng_t lopt[] = { { ":log", 'l' }, { ":worker-max-count", '\0' }, { ":worker-stack-size", '\0' }, { ":worker-idle-timeout", '\0' }, { ":actor-heap-size", 'm' }, { ":actor-max-runtime", '\0' }, { ":script-include-path", '\0' }, #if defined(HAK_BUILD_DEBUG) { ":debug", '\0' }, /* NOTE: there is no short option for --debug */ #endif { HAK_NULL, '\0' } }; static hak_bopt_t opt = { "l:m:", lopt }; hak_server_t* server; server_xtn_t* xtn; hak_server_prim_t server_prim; int n; const char* logopt = HAK_NULL; const char* dbgopt = HAK_NULL; const char* incpath = HAK_NULL; hak_oow_t worker_max_count = 0; hak_oow_t worker_stack_size = MIN_ACTOR_HEAP_SIZE; hak_ntime_t worker_idle_timeout = { 0, 0 }; hak_oow_t actor_heap_size = MIN_ACTOR_HEAP_SIZE; hak_ntime_t actor_max_runtime = { 0, 0 }; setlocale (LC_ALL, ""); if (argc < 2) { print_usage: fprintf (stderr, "Usage: %s %s bind-address:port\n", outer, argv[0]); return -1; } while ((c = hak_getbopt(argc, argv, &opt)) != HAK_BCI_EOF) { switch (c) { case 'l': logopt = opt.arg; break; case 'm': actor_heap_size = strtoul(opt.arg, HAK_NULL, 0); if (actor_heap_size > 0 && actor_heap_size <= MIN_ACTOR_HEAP_SIZE) actor_heap_size = MIN_ACTOR_HEAP_SIZE; break; case '\0': if (hak_comp_bcstr(opt.lngopt, "worker-max-count") == 0) { worker_max_count = strtoul(opt.arg, HAK_NULL, 0); } else if (hak_comp_bcstr(opt.lngopt, "worker-stack-size") == 0) { worker_stack_size = strtoul(opt.arg, HAK_NULL, 0); if (worker_stack_size <= MIN_WORKER_STACK_SIZE) worker_stack_size = MIN_WORKER_STACK_SIZE; } else if (hak_comp_bcstr(opt.lngopt, "worker-idle-timeout") == 0) { worker_idle_timeout.sec = strtoul(opt.arg, HAK_NULL, 0); } else if (hak_comp_bcstr(opt.lngopt, "actor-max-runtime") == 0) { actor_max_runtime.sec = strtoul(opt.arg, HAK_NULL, 0); } else if (hak_comp_bcstr(opt.lngopt, "script-include-path") == 0) { incpath = opt.arg; } #if defined(HAK_BUILD_DEBUG) else if (hak_comp_bcstr(opt.lngopt, "debug") == 0) { dbgopt = opt.arg; } #endif else goto print_usage; break; case ':': if (opt.lngopt) fprintf (stderr, "bad argument for '%s'\n", opt.lngopt); else fprintf (stderr, "bad argument for '%c'\n", opt.opt); return -1; default: goto print_usage; } } if (opt.ind >= argc) goto print_usage; memset (&server_prim, 0, HAK_SIZEOF(server_prim)); server_prim.log_write = server_log_write; server = hak_server_open(&sys_mmgr, HAK_SIZEOF(server_xtn_t), &server_prim, HAK_NULL); if (!server) { fprintf (stderr, "cannot open server\n"); return -1; } xtn = (server_xtn_t*)hak_server_getxtn(server); xtn->logfd = -1; xtn->logfd_istty = 0; if (logopt) { if (handle_logopt(xtn, logopt) <= -1) goto oops; } else { /* default logging mask when no logging option is set */ xtn->logmask = HAK_LOG_ALL_TYPES | HAK_LOG_ERROR | HAK_LOG_FATAL; } #if defined(HAK_BUILD_DEBUG) if (dbgopt) { if (handle_dbgopt(server, dbgopt) <= -1) goto oops; } #endif if (incpath) { if (handle_incpath(server, incpath) <= -1) goto oops; } hak_server_setoption (server, HAK_SERVER_WORKER_MAX_COUNT, &worker_max_count); hak_server_setoption (server, HAK_SERVER_WORKER_STACK_SIZE, &worker_stack_size); hak_server_setoption (server, HAK_SERVER_WORKER_IDLE_TIMEOUT, &worker_idle_timeout); hak_server_setoption (server, HAK_SERVER_ACTOR_HEAP_SIZE, &actor_heap_size); hak_server_setoption (server, HAK_SERVER_ACTOR_MAX_RUNTIME, &actor_max_runtime); g_server = server; set_signal (SIGINT, handle_sigint); set_signal_to_ignore (SIGPIPE); n = hak_server_start(server, argv[opt.ind]); set_signal_to_default (SIGINT); set_signal_to_default (SIGPIPE); g_server = NULL; if (n <= -1) { hak_server_logbfmt (server, HAK_LOG_APP | HAK_LOG_FATAL, "server error[%d] - %js\n", hak_server_geterrnum(server), hak_server_geterrmsg(server)); } if (xtn->logfd >= 0) { close (xtn->logfd); xtn->logfd = -1; xtn->logfd_istty = 0; } hak_server_close (server); return n; oops: if (server) hak_server_close (server); return -1; } /* -------------------------------------------------------------- */ static int client_on_packet (hak_client_t* client, hak_xpkt_type_t type, const void* data, hak_oow_t len) { if (type == HAK_XPKT_STDOUT) { if (len > 0) fprintf (stdout, "%.*s", (int)len, data); } else if (type == HAK_XPKT_STDERR) { if (len > 0) fprintf (stderr, "%.*s", (int)len, data); } else if (type == HAK_XPKT_ERROR) { /* error notification */ if (len > 0) fprintf (stderr, "ERROR: %.*s\n", (int)len, data); } else if (type == HAK_XPKT_RETVAL) { if (len > 0) fprintf (stderr, "RETURN VALUE: %.*s\n", (int)len, data); hak_client_stop (client); } return 1; } static int client_main (const char* outer, int argc, char* argv[]) { hak_bci_t c; static hak_bopt_lng_t lopt[] = { { ":log", 'l' }, { "shutwr", '\0' }, { HAK_NULL, '\0' } }; static hak_bopt_t opt = { "l:", lopt }; hak_client_t* client; client_xtn_t* xtn; hak_client_prim_t client_prim; int n; const char* logopt = HAK_NULL; int shut_wr_after_req = 0; setlocale (LC_ALL, ""); if (argc < 2) { print_usage: fprintf (stderr, "Usage: %s %s [options] bind-address:port script-to-run\n", outer, argv[0]); fprintf (stderr, "Options are:\n"); fprintf (stderr, " -l/--log log-options\n"); fprintf (stderr, " --shutwr\n"); return -1; } while ((c = hak_getbopt(argc, argv, &opt)) != HAK_BCI_EOF) { switch (c) { case 'l': logopt = opt.arg; break; case '\0': if (hak_comp_bcstr(opt.lngopt, "shutwr") == 0) { shut_wr_after_req = 1; } else { goto print_usage; } break; case ':': if (opt.lngopt) fprintf (stderr, "bad argument for '%s'\n", opt.lngopt); else fprintf (stderr, "bad argument for '%c'\n", opt.opt); return -1; default: goto print_usage; } } /* needs 2 fixed arguments */ if (opt.ind + 1 >= argc) goto print_usage; memset (&client_prim, 0, HAK_SIZEOF(client_prim)); client_prim.log_write = client_log_write; client_prim.on_packet = client_on_packet; client = hak_client_open(&sys_mmgr, HAK_SIZEOF(client_xtn_t), &client_prim, HAK_NULL); if (!client) { fprintf (stderr, "cannot open client\n"); return -1; } xtn = (client_xtn_t*)hak_client_getxtn(client); xtn->logfd = -1; xtn->logfd_istty = 0; if (logopt) { if (handle_logopt(xtn, logopt) <= -1) goto oops; } else { /* default logging mask when no logging option is set */ xtn->logmask = HAK_LOG_ALL_TYPES | HAK_LOG_ERROR | HAK_LOG_FATAL; } g_client = client; set_signal (SIGINT, handle_sigint); set_signal_to_ignore (SIGPIPE); n = hak_client_start(client, argv[opt.ind], /*argv[opt.ind + 1],*/ shut_wr_after_req); if (n <= -1) { fprintf (stderr, "ERROR: %s\n", hak_client_geterrbmsg(client)); goto oops; } set_signal_to_default (SIGINT); set_signal_to_default (SIGPIPE); g_client = NULL; if (xtn->logfd >= 0) { close (xtn->logfd); xtn->logfd = -1; xtn->logfd_istty = 0; } hak_client_close (client); return n; oops: if (client) hak_client_close (client); return -1; } /* -------------------------------------------------------------- */ static int json_inst_cb (hak_json_t* json, hak_json_inst_t it, const hak_oocs_t* str) { json_xtn_t* json_xtn = (json_xtn_t*)hak_json_getxtn(json); switch (it) { case HAK_JSON_INST_START_ARRAY: json_xtn->json_depth++; hak_json_logbfmt (json, HAK_LOG_INFO | HAK_LOG_APP, "[\n"); break; case HAK_JSON_INST_END_ARRAY: json_xtn->json_depth--; hak_json_logbfmt (json, HAK_LOG_INFO | HAK_LOG_APP, "]\n"); break; case HAK_JSON_INST_START_DIC: json_xtn->json_depth++; hak_json_logbfmt (json, HAK_LOG_INFO | HAK_LOG_APP, "{\n"); break; case HAK_JSON_INST_END_DIC: json_xtn->json_depth--; hak_json_logbfmt (json, HAK_LOG_INFO | HAK_LOG_APP, "}\n"); break; case HAK_JSON_INST_KEY: hak_json_logbfmt (json, HAK_LOG_INFO | HAK_LOG_APP, "%.*js: ", str->len, str->ptr); break; case HAK_JSON_INST_CHARACTER: case HAK_JSON_INST_STRING: case HAK_JSON_INST_NUMBER: case HAK_JSON_INST_TRUE: case HAK_JSON_INST_FALSE: case HAK_JSON_INST_NIL: hak_json_logbfmt (json, HAK_LOG_INFO | HAK_LOG_APP, "%.*js\n", str->len, str->ptr); break; } return 0; } int json_main (const char* outer, int argc, char* argv[]) { hak_json_t* json; hak_json_prim_t json_prim; json_xtn_t* json_xtn; hak_oow_t xlen; const char* p; /* TODO: enhance this to accept parameters from command line */ memset (&json_prim, 0, HAK_SIZEOF(json_prim)); json_prim.log_write = json_log_write; json_prim.instcb = json_inst_cb; json = hak_json_open (&sys_mmgr, HAK_SIZEOF(json_xtn_t), &json_prim, NULL); json_xtn = (json_xtn_t*)hak_json_getxtn(json); json_xtn->logmask = HAK_LOG_ALL_LEVELS | HAK_LOG_ALL_TYPES; p = "[ \"ab\\xab\\uC88B\\uC544\\uC6A9c\", \"kaden\", \"iron\", true, { \"null\": \"a\\1bc\", \"123\": \"AA20AA\", \"10\": -0.123, \"way\": '\\uC88A' } ]"; /*p = "{ \"result\": \"SUCCESS\", \"message\": \"1 clients\", \"sessions\": [] }";*/ if (hak_json_feed(json, p, strlen(p), &xlen) <= -1) { hak_json_logbfmt (json, HAK_LOG_FATAL | HAK_LOG_APP, "ERROR: unable to process - %js\n", hak_json_geterrmsg(json)); } else if (json_xtn->json_depth != 0) { hak_json_logbfmt (json, HAK_LOG_FATAL | HAK_LOG_APP, "ERROR: incomplete input\n"); } hak_json_close (json); return 0; } /* -------------------------------------------------------------- */ static void print_main_usage (const char* argv0) { fprintf (stderr, "Usage: %s server|client|json\n", argv0); } int main (int argc, char* argv[]) { int n; const char* argv0; argv0 = hak_get_base_name_from_bcstr_path(argv[0]); if (argc < 2) { print_main_usage (argv0); n = -1; } else if (strcmp(argv[1], "server") == 0) { n = server_main(argv0, argc -1, &argv[1]); } else if (strcmp(argv[1], "client") == 0) { n = client_main(argv[0], argc -1, &argv[1]); } else if (strcmp(argv[1], "json") == 0) { n = json_main(argv[0], argc -1, &argv[1]); } else { print_main_usage (argv[0]); n = -1; } return n; }